Core-shell type stars synthesized via atom transfer radical polymerization were used for the delivery of nucleic acids. The interior of the stars consisted of hyperbranched poly(arylene oxindole), while the arms were composed of poly(N,N-dimethylaminoethyl methacrylate). The length of the star arms varied in degree of polymerization (DP) from 14 to 98. The hydrodynamic radius of the structures measured in water indicated the presence of small aggregates, while isolated stars ranging in size from 14 to 29 nm were seen in organic solvent. The phase transition temperatures of the stars in water, measured in basic conditions, were shifted to lower values with increasing DP of the arms. Stable polyplexes of stars with plasmid DNA were formed. Their size varied from 300 nm to 400 nm, depending upon the DP of arms. The zeta potential of the polyplexes was positive, which facilitated their cellular uptake. The DP of the arms influenced the transfection efficiency of HT-1080 cells, demonstrating that stars are promising candidates for synthetic gene vectors. 相似文献
With the development of Computer-aided Diagnosis (CAD) and image scanning techniques, Whole-slide Image (WSI) scanners are widely used in the field of pathological diagnosis. Therefore, WSI analysis has become the key to modern digital histopathology. Since 2004, WSI has been used widely in CAD. Since machine vision methods are usually based on semi-automatic or fully automatic computer algorithms, they are highly efficient and labor-saving. The combination of WSI and CAD technologies for segmentation, classification, and detection helps histopathologists to obtain more stable and quantitative results with minimum labor costs and improved diagnosis objectivity. This paper reviews the methods of WSI analysis based on machine learning. Firstly, the development status of WSI and CAD methods are introduced. Secondly, we discuss publicly available WSI datasets and evaluation metrics for segmentation, classification, and detection tasks. Then, the latest development of machine learning techniques in WSI segmentation, classification, and detection are reviewed. Finally, the existing methods are studied, and the application prospects of the methods in this field are forecasted.
The Contractibility problem takes as input two graphs G and H, and the task is to decide whether H can be obtained from G by a sequence of edge contractions. The Induced Minor and Induced Topological Minor problems are similar, but the first allows both edge contractions and vertex deletions, whereas the latter allows only vertex deletions and vertex dissolutions. All three problems are NP-complete, even for certain fixed graphs H. We show that these problems can be solved in polynomial time for every fixed H when the input graph G is chordal. Our results can be considered tight, since these problems are known to be W[1]-hard on chordal graphs when parameterized by the size of H. To solve Contractibility and Induced Minor, we define and use a generalization of the classic Disjoint Paths problem, where we require the vertices of each of the k paths to be chosen from a specified set. We prove that this variant is NP-complete even when k=2, but that it is polynomial-time solvable on chordal graphs for every fixed k. Our algorithm for Induced Topological Minor is based on another generalization of Disjoint Paths called Induced Disjoint Paths, where the vertices from different paths may no longer be adjacent. We show that this problem, which is known to be NP-complete when k=2, can be solved in polynomial time on chordal graphs even when k is part of the input. Our results fit into the general framework of graph containment problems, where the aim is to decide whether a graph can be modified into another graph by a sequence of specified graph operations. Allowing combinations of the four well-known operations edge deletion, edge contraction, vertex deletion, and vertex dissolution results in the following ten containment relations: (induced) minor, (induced) topological minor, (induced) subgraph, (induced) spanning subgraph, dissolution, and contraction. Our results, combined with existing results, settle the complexity of each of the ten corresponding containment problems on chordal graphs. 相似文献
Verification of identity based on the analysis of dynamic signatures is an important problem of biometrics. The effectiveness of the verification significantly increases when the dynamic characteristics of signature (e.g. velocity of the pen) are considered. These characteristics are individual for each user and difficult to imitate. The effectiveness of the verification can be further improved by using partitioning. In this paper we propose a new method which uses partitioning. In our method partitions represent areas of high and low speed of signature and high and low pen?s pressure. All selected partitions are used by our algorithm, but more important in the classification process are these partitions, in which the signatures of the user acquired during training phase are more stable. Moreover, final classification is interpretable. In this paper we present the simulation results of the proposed method for the two databases: SVC2004 and BioSecure Database. 相似文献
This paper describes a method of rigorous verification of an isolating neighborhood based on computer assisted computations. As an application we study the Kuramoto-Sivashinsky equation. The result of the computer assisted proof was directly used in [9] to prove the existence of heteroclinic solutions of the Kuramoto-Sivashinsky equation. 相似文献
We propose a new encryption algorithm relying on reversible cellular automata (CA). The behavior complexity of CA and their
parallel nature makes them interesting candidates for cryptography. The proposed algorithm belongs to the class of symmetric
key systems.
Marcin Seredynski: He is a Ph.D. student at University of Luxembourg and Polish Academy of Sciences. He received his M.S. in 2004 from Faculty
of Electronics and Information Technology in Warsaw University of Technology. His research interests include cryptography,
cellular automata, nature inspired algorithms and network security. Currently he is working on intrusion detection algorithms
for ad-hoc networks.
Pascal Bouvry, Ph.D.: He earned his undergraduate degree in Economical & Social Sciences and his Master degree in Computer Science with distinction
(’91) from the University of Namur, Belgium. He went on to obtain his Ph.D. degree (’94) in Computer Science with great distinction
at the University of Grenoble (INPG), France. His research at the IMAG laboratory focussed on Mapping and scheduling task
graphs onto Distributed Memory Parallel Computers. Next, he performed post-doctoral researches on coordination languages and
multi-agent evolutionary computing at CWI in Amsterdam. He gained industrial experience as manager of the technology consultant
team for FICS in the banking sector (Brussels, Belgium). Next, he worked as CEO and CTO of SDC (Ho Chi Minh city, Vietnam)
in the telecom, semi-conductor and space industry. After that, He moved to Montreal Canada as VP Production of Lat45 and Development
Director for MetaSolv Software in the telecom industry. He is currently serving as Professor in the group of Computer Science
and Communications (CSC) of the Faculty of Sciences, Technology and Communications of Luxembourg University and he is heading
the Intelligent & Adaptive Systems lab. His current research interests include: ad-hoc networks & grid-computing, evolutionary
algorithms and multi-agent systems. 相似文献
In this paper we consider the mutual exclusion problem on a multiple access channel. Mutual exclusion is one of the fundamental problems in distributed computing. In the classic version of this problem, n processes execute a concurrent program that occasionally triggers some of them to use shared resources, such as memory, communication channel, device, etc. The goal is to design a distributed algorithm to control entries and exits to/from the shared resource (also called a critical section), in such a way that at any time, there is at most one process accessing it. In our considerations, the shared resource is the shared communication channel itself (multiple access channel), and the main challenge arises because the channel is also the only mean of communication between these processes. We consider both the classic and a slightly weaker version of mutual exclusion, called \(\varepsilon \)-mutual-exclusion, where for each period of a process staying in the critical section the probability that there is some other process in the critical section is at most \(\varepsilon \). We show that there are channel settings, where the classic mutual exclusion is not feasible even for randomized algorithms, while the \(\varepsilon \)-mutual-exclusion is. In more relaxed channel settings, we prove an exponential gap between the makespan complexity of the classic mutual exclusion problem and its weaker \(\varepsilon \)-exclusion version. We also show how to guarantee fairness of mutual exclusion algorithms, i.e., that each process that wants to enter the critical section will eventually succeed. 相似文献
Application Layer Traffic Optimization (ALTO) has recently gained attention in the research and standardisation community as a way for a network operator to guide the peer selection process of distributed applications by providing network layer topology information. In particular P2P applications are expected to gain from ALTO, due to the many connections peers form among each other, often without taking network layer topology information into account. In this paper, we present results of an extensive intra-ISP trial with an ALTO-enhanced P2P filesharing software. In summary, our results show that—depending on the concrete setting and on the distribution of upload capacity in the network—ALTO enables an ISP to save operational costs significantly while not degrading application layer performance noticeably. In addition, based on our experience we are able to give advice to operators on how to save costs with ALTO while not sacrificing application layer performance at all. 相似文献
In this paper, an active fault-tolerant control scheme is proposed in the case of actuator faults. In particular, the general idea of integrating fault identification and control schemes, which takes into account the fault estimation error is first presented in a linear context. As a result, the so-called separation principle for the controller and the fault identification scheme is developed. Subsequently, the proposed approach is extended to a class of non-linear systems. Similarly to the linear case, it is proven that using a suitable control strategy and a faulty identification scheme it is possible to obtain an integrated fault-tolerant control framework, which takes into account the fault identification error. As a result, a non-linear counterpart of the above-mentioned separation principle is developed. Finally, the last part of the paper shows the application results obtained using a twin-rotor system that confirm the high performance of the proposed approach. 相似文献